Cheng Fei, Jun Shen, Hongling Qiu, Xiaoqi Song, Yamin Wang
{"title":"虚假数据注入攻击下异构多agent系统的数据驱动输出同步","authors":"Cheng Fei, Jun Shen, Hongling Qiu, Xiaoqi Song, Yamin Wang","doi":"10.1049/cth2.70027","DOIUrl":null,"url":null,"abstract":"<p>This paper investigates strategies for achieving optimal output synchronization of heterogeneous multi-agent systems in the presence of false data injection attacks. We formulate a performance index with an infinite time horizon using a zero-sum game framework, treating control input and false data injection attack input as two opposing players. Specifically, the control input's objective is to minimize the performance index, while the false data injection attack input aims to maximize it. Adhering to the optimality principle, we derive the optimal control policy, contingent upon the solution to a related algebraic Riccati equation. Moreover, we propose sufficient conditions that ensure the existence of a solution to the algebraic Riccati equation. Additionally, we have devised a data-driven reinforcement learning algorithm to seek the solution, and its convergence is assured. Furthermore, it has been demonstrated that the solution to this game corresponds to a Nash equilibrium point. Finally, the validity of the proposed methodology is substantiated through simulation results.</p>","PeriodicalId":50382,"journal":{"name":"IET Control Theory and Applications","volume":"19 1","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cth2.70027","citationCount":"0","resultStr":"{\"title\":\"Data-Driven Output Synchronization of Heterogeneous Multi-Agent Systems under False Data Injection Attacks\",\"authors\":\"Cheng Fei, Jun Shen, Hongling Qiu, Xiaoqi Song, Yamin Wang\",\"doi\":\"10.1049/cth2.70027\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This paper investigates strategies for achieving optimal output synchronization of heterogeneous multi-agent systems in the presence of false data injection attacks. We formulate a performance index with an infinite time horizon using a zero-sum game framework, treating control input and false data injection attack input as two opposing players. Specifically, the control input's objective is to minimize the performance index, while the false data injection attack input aims to maximize it. Adhering to the optimality principle, we derive the optimal control policy, contingent upon the solution to a related algebraic Riccati equation. Moreover, we propose sufficient conditions that ensure the existence of a solution to the algebraic Riccati equation. Additionally, we have devised a data-driven reinforcement learning algorithm to seek the solution, and its convergence is assured. Furthermore, it has been demonstrated that the solution to this game corresponds to a Nash equilibrium point. Finally, the validity of the proposed methodology is substantiated through simulation results.</p>\",\"PeriodicalId\":50382,\"journal\":{\"name\":\"IET Control Theory and Applications\",\"volume\":\"19 1\",\"pages\":\"\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2025-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cth2.70027\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Control Theory and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/cth2.70027\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Control Theory and Applications","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cth2.70027","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Data-Driven Output Synchronization of Heterogeneous Multi-Agent Systems under False Data Injection Attacks
This paper investigates strategies for achieving optimal output synchronization of heterogeneous multi-agent systems in the presence of false data injection attacks. We formulate a performance index with an infinite time horizon using a zero-sum game framework, treating control input and false data injection attack input as two opposing players. Specifically, the control input's objective is to minimize the performance index, while the false data injection attack input aims to maximize it. Adhering to the optimality principle, we derive the optimal control policy, contingent upon the solution to a related algebraic Riccati equation. Moreover, we propose sufficient conditions that ensure the existence of a solution to the algebraic Riccati equation. Additionally, we have devised a data-driven reinforcement learning algorithm to seek the solution, and its convergence is assured. Furthermore, it has been demonstrated that the solution to this game corresponds to a Nash equilibrium point. Finally, the validity of the proposed methodology is substantiated through simulation results.
期刊介绍:
IET Control Theory & Applications is devoted to control systems in the broadest sense, covering new theoretical results and the applications of new and established control methods. Among the topics of interest are system modelling, identification and simulation, the analysis and design of control systems (including computer-aided design), and practical implementation. The scope encompasses technological, economic, physiological (biomedical) and other systems, including man-machine interfaces.
Most of the papers published deal with original work from industrial and government laboratories and universities, but subject reviews and tutorial expositions of current methods are welcomed. Correspondence discussing published papers is also welcomed.
Applications papers need not necessarily involve new theory. Papers which describe new realisations of established methods, or control techniques applied in a novel situation, or practical studies which compare various designs, would be of interest. Of particular value are theoretical papers which discuss the applicability of new work or applications which engender new theoretical applications.